Information Security
@sec_nerd_en
415
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
415 subscribers
Information Security
https://www.a12d404.net/windows/2019/01/13/persistance-via-path-directories.html
www.a12d404.net
Windows 10 Persistence via PATH directories - CDPSvc
CDPSvc allows DLL Loading via writable PATH directories
Information Security
https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software
Apriorit
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing | Apriorit
This article is about discovering vulnerabilities even in closed source software by applying fuzzing testing.
Information Security
https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/
Decoder's Blog
From iPhone to NT AUTHORITY\SYSTEM
As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on r…
Information Security
https://microsoft.github.io/CCF/
https://github.com/microsoft/CCF
GitHub
GitHub - microsoft/CCF: Confidential Consortium Framework
Confidential Consortium Framework. Contribute to microsoft/CCF development by creating an account on GitHub.
Information Security
https://github.com/hubert3/isniff-gps
GitHub
hubert3/iSniff-GPS
Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices - hubert3/iSniff-GPS
Information Security
https://medium.com/tenable-techblog/winbox-in-the-wild-9a2ee4946add
Medium
Winbox in the Wild
Port 8291 Scan Results
Information Security
https://medium.com/@dirtycoder0124/blind-xss-a-mind-game-to-win-the-battle-4fc67c524678
Medium
Blind Xss (A mind game to win the battle)
In this write-up, I will explain how I exploited a blind XSS in the backend portal of a program.
Information Security
https://rastamouse.me/2018/03/a-view-of-persistence/
Information Security
https://nao-sec.org/2019/12/say-hello-to-bottle-exploit-kit.html
nao-sec.org
Say hello to Bottle Exploit Kit targeting Japan - @nao_sec
Information Security
https://medium.com/@osint/tiktok-using-osint-to-discover-new-leads-f7e6c27601d1
?
Medium
TikTok — Using OSINT to Discover New Leads
TikTok has been with us for a couple of years now but we haven’t seen people using it in their investigations much until now. The mobile…
Information Security
https://medium.com/@prasetia.ari/tokopedia-idor-pada-chat-inbox-berakibat-bisa-membaca-title-chat-orang-lain-503883cb9540
Medium
Tokopedia IDOR pada chat/inbox, berakibat bisa membaca title chat orang lain
Ditemukan : 2 Mei 2017
Information Security
https://github.com/itm4n/VBA-RunPE
GitHub
GitHub - itm4n/VBA-RunPE: A VBA implementation of the RunPE technique or how to bypass application whitelisting.
A VBA implementation of the RunPE technique or how to bypass application whitelisting. - itm4n/VBA-RunPE
Information Security
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
Bishop Fox
CVE-2019-18935: Remote Code Execution via Insecure Deserialization in…
Telerik UI for ASP.NET AJAX insecurely deserializes JSON objects resulting in arbitrary RCE. Learn how to patch and securely configure this software.
Information Security
https://syedfarazabrar.com/2019-12-13-starctf-oob-v8-indepth/
faraz.faith
Exploiting v8: *CTF 2019 oob-v8
Information Security
https://0xrick.github.io/hack-the-box/smasher2/
0xRick's Blog
Hack The Box - Smasher2
My write-up / walkthrough for Smasher2 from Hack The Box.
Information Security
https://github.com/axi0mX/ipwndfu
GitHub
GitHub - axi0mX/ipwndfu: open-source jailbreaking tool for many iOS devices
open-source jailbreaking tool for many iOS devices - axi0mX/ipwndfu
Information Security
https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8
Medium
eGain Web API Email Header Injection
CVE-2019–17123
Information Security
https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html
Google Cloud Blog
Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign | Mandiant | Google Cloud Blog
Information Security
https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/
Oddvar Moe's Blog
Persistence using RunOnceEx – Hidden from Autoruns.exe
TL;DR – Found a technique to execute DLL files without being detected by autoruns.exe at logon. – Requires administrator rights and does not belong in userland. – Run this to Expl…
Information Security
https://gts3.org/2019/Real-World-CTF-2019-Safari.html
Systems Software and Security Lab
Hack The Real: An exploitation chain to break the Safari browser
Exploiting type confusion bugs in latest JSC and escaping the sandbox